Development

CVE-2025-3200: Wiesemann & Theis Com-Server Devices Exposed by Deprecated TLS Protocols

A coordinated security advisory from CERT@VDE and Wiesemann & Theis GmbH has revealed critical vulnerabilities impacting several Wiesemann & Theis products, including the Com-Server++ and related mode …
Read more

Published Date:
Apr 29, 2025 (3 hours, 3 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-3200

CVE-2025-46617

CVE-2025-46616

Quantum Issues Critical Patch for StorNext GUI RCE Vulnerabilities (CVE-2025-46616, CVE-2025-46617)

Quantum has issued a critical security advisory warning users of two high-severity vulnerabilities in the StorNext GUI API, affecting a wide range of StorNext products. If exploited together, these vu …
Read more

Published Date:
Apr 29, 2025 (3 hours, 2 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-3200

CVE-2025-46617

CVE-2025-46616

Fog Ransomware Group Exposed: Inside the Tools, Tactics, and Victims of a Stealthy Threat

Image: DFIR Report’s Threat Intel Group
In a new investigation, The DFIR Report’s Threat Intel Group has shed light on the growing operations of the Fog ransomware group, revealing a sophisticated ars …
Read more

Published Date:
Apr 29, 2025 (2 hours, 55 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-46617

CVE-2025-46616

CVE-2024-40711

CVE-2021-42278

CVE-2020-1472

CVE-2025-21756: How a Tiny Linux Kernel Bug Led to a Full Root Exploit, PoC Releases

In a recently analysis, security researcher Michael Hoefler has exposed the full depth of CVE-2025-21756, a Use-After-Free (UAF) vulnerability affecting the Linux kernel’s vsock subsystem. What began …
Read more

Published Date:
Apr 29, 2025 (2 hours, 45 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-21756

Apache Tomcat Security Update Fixes DoS and Rewrite Rule Bypass Flaws

The Apache Software Foundation has released important security updates to address two vulnerabilities affecting multiple versions of Apache Tomcat, the widely used open-source Java Servlet container. …
Read more

Published Date:
Apr 29, 2025 (1 hour, 57 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-31651

CVE-2025-31650

CVE-2025-24813

CVE-2025-21756

0-Click NTLM Authentication Bypass Hits Microsoft Telnet Server, PoC Releases, No Patch

A severe vulnerability affecting Microsoft Telnet Server has been uncovered, allowing remote attackers to completely bypass authentication and gain administrator access without valid credentials. Deta …
Read more

Published Date:
Apr 29, 2025 (1 hour, 40 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-0890

CVE-2024-40891

CVE-2024-38063

CVE ID : CVE-2025-46326

Published : April 28, 2025, 11:15 p.m. | 3 hours, 50 minutes ago

Description : snowflake-connector-net is the Snowflake Connector for .NET. Versions starting from 2.1.2 to before 4.4.1, are vulnerable to a Time-of-Check to Time-of-Use (TOCTOU) race condition. When using the Easy Logging feature on Linux and macOS, the Connector reads logging configuration from a user-provided file. On Linux and macOS, the Connector verifies that the configuration file can be written to only by its owner. That check was vulnerable to a TOCTOU race condition and failed to verify that the file owner matches the user running the Connector. This could allow a local attacker with write access to the configuration file or the directory containing it to overwrite the configuration and gain control over logging level and output location. This issue has been patched in version 4.4.1.

Severity: 3.3 | LOW

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-46328

Published : April 28, 2025, 11:15 p.m. | 3 hours, 50 minutes ago

Description : snowflake-connector-nodejs is a NodeJS driver for Snowflake. Versions starting from 1.10.0 to before 2.0.4, are vulnerable to a Time-of-Check to Time-of-Use (TOCTOU) race condition. When using the Easy Logging feature on Linux and macOS the Driver reads logging configuration from a user-provided file. On Linux and macOS the Driver verifies that the configuration file can be written to only by its owner. That check was vulnerable to a TOCTOU race condition and failed to verify that the file owner matches the user running the Driver. This could allow a local attacker with write access to the configuration file or the directory containing it to overwrite the configuration and gain control over logging level and output location. This issue has been patched in version 2.0.4.

Severity: 3.3 | LOW

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-46327

Published : April 28, 2025, 11:15 p.m. | 3 hours, 50 minutes ago

Description : gosnowflake is the Snowflake Golang driver. Versions starting from 1.7.0 to before 1.13.3, are vulnerable to a Time-of-Check to Time-of-Use (TOCTOU) race condition. When using the Easy Logging feature on Linux and macOS, the Driver reads logging configuration from a user-provided file. On Linux and macOS the Driver verifies that the configuration file can be written to only by its owner. That check was vulnerable to a TOCTOU race condition and failed to verify that the file owner matches the user running the Driver. This could allow a local attacker with write access to the configuration file or the directory containing it to overwrite the configuration and gain control over logging level and output location. This issue has been patched in version 1.13.3.

Severity: 3.3 | LOW

Visit the link for more details, such as CVSS details, affected products, timeline, and more…